A Python library for extracting Structured Threat Information Expression (STIX™) Indicators from Malware Attribute Enumeration and Characterization (MAEC™) data, and also wrapping MAEC data in STIX.
Source: | https://github.com/MAECProject/maec-to-stix |
---|---|
Documentation: | http://maec-to-stix.readthedocs.org |
Information: | http://maecproject.github.io |
Download: | https://pypi.python.org/pypi/maec-to-stix/ |
The maec-to-stix package provides APIs and scripts for wrapping MAEC Packages
in STIX, and also extracting STIX Indicators from dynamic analysis data captured
in MAEC. It is compatible with the latest versions of MAEC and STIX,
4.1
and 1.1
, respectively.
Use pip to install or upgrade maec-to-stix:
$ pip install maec-to-stix [--pre] [--upgrade]
For more information, see the Installation instructions.
The maec-to-stix library depends on the presence of certain packages/libraries to function. Please refer to their installation documentation for installation instructions.
- python-maec >=4.1.0.10 and <= 4.1.0.12
- python-stix >=1.1.1.3 and <= 1.1.1.6.
- python-cybox >=2.1.0.9 and <= 2.1.0.12.
Read the Getting Started guide.
The maec-to-stix repository has the following layout:
docs/
- Used to build the documentation.maec_to_stix/
- The main maec-to-stix source.examples/
- Examples of maec-to-stix usage.
Releases of maec-to-stix are given major.minor.patch
version numbers and
follow semantic versioning guidelines.
Bug reports and feature requests are welcome and encouraged. Feel free to use the issue tracker on GitHub, join the MAEC Community Email Discussion List , or send an email directly to [email protected].
BY USING MAEC-TO-STIX YOU SIGNIFY YOUR ACCEPTANCE OF THE TERMS AND CONDITIONS OF USE. IF YOU DO NOT AGREE TO THESE TERMS, DO NOT USE MAEC-TO-STIX.
For more information, please refer to the LICENSE.txt file